This paper presents numerical investigations on the seismic behavior of full-scale square concrete filled steel tubular (CFST) columns. The main objective is to understand the seismic behavior and evaluate the seismic...
详细信息
ISBN:
(纸本)9789811632389
This paper presents numerical investigations on the seismic behavior of full-scale square concrete filled steel tubular (CFST) columns. The main objective is to understand the seismic behavior and evaluate the seismic performance of these composite columns under high levels of axial compression. Finite element analysis (FEA) models in ABAQUS software were used to simulate a series of columns subjected to axial compression and cyclic lateral loading. The CFST columns were modeled using eight-node reduced integration brick elements (C3D8R) for the infilled concrete with confinement effect, and four-node reduced integration shell elements (S4R) for the steel tube with consideration of steel-concrete interaction and steel wall’s buckling. The feasibility of the FEA models has been validated by published experimental results. The validated FEA model was further extended to conduct parametric studies with various parameters including width-to-thickness ratio (B/t), concrete strength, and axial compression level. The numerical analysis results reveal that with the same B/t and constituent materials, the higher the axial compression was, the lower the shear strength and the deformation capacity were. Also, the higher axial compression led to earlier local buckling of the steel tube, especially, in the case of the thinner steel wall (B/t of 41.7). The thicker steel wall (B/t of 20.8) resulted in higher strength and larger deformation capacity of the column. Increasing concrete material strength significantly improved the column’s shear strength for both thinner and thicker steel walls, but it led to significant development in deformation for the column having thicker steel walls. This study also reveals that only the square CFST columns with B/t of 20.8 using medium material strengths satisfy the seismic performance demand for the building columns in high seismic zones (ultimate interstory drift ratio (IDRu) not less than 3% radian) under high axial compression (up to 55% of
Neural networks with ReLU activation play a key role in modern machine learning. In view of safety-critical applications, the verification of trained networks is of great importance and necessitates a thorough underst...
详细信息
Vehicular ad hoc networks (VANETs) take vital role in intelligent transportation systems, but they face challenges due to dynamic network topology, impacting communication efficiency, especially with increasing active...
详细信息
ISBN:
(数字)9798350395914
ISBN:
(纸本)9798350395921
Vehicular ad hoc networks (VANETs) take vital role in intelligent transportation systems, but they face challenges due to dynamic network topology, impacting communication efficiency, especially with increasing active nodes. Security and privacy concerns are paramount, necessitating authentication to ensure only legitimate vehicles access the network. Secure vehicular clustering offers a solution, yet the number of clusters affects network dependability and efficiency. To tackle this, we present a secure clustering mechanism using Bat optimization algorithm, mimicking echolocation behavior to optimize clusters. We introduce an authentication technique for cluster heads to admit approved members, enhancing vehicular authentication. Simulations using MATLAB evaluate our approach, showing improved performance in end-to-end delay, overhead, and cluster head count compared to similar methods.
In this paper the problem of testing decision making systems for MEC platforms was formulated. Methods and means of organizing the introduction of network delays as part of the emulation system of MEC platforms LWMECP...
In this paper the problem of testing decision making systems for MEC platforms was formulated. Methods and means of organizing the introduction of network delays as part of the emulation system of MEC platforms LWMECPS were analyzed. Test applications mec-test-app and mec-test-client are developed for testing and evaluation of the introduced network delays. Developed mec-orch-app to provide test application management and metrics collection. Experiments have been conducted to estimate the insertion latency and manage the test applications using mec-orch-app. Special attention was paid to the organization of all parts of the system as a future laboratory bench for testing decision systems using reinforcement learning machine learning algorithms.
Microorganisms may cause illness when they enter the body, multiply, and spread to other parts. The rapid spread of COVID-19 to neighboring countries is examined in this research. Anticipating a positive COVID-19 occu...
Microorganisms may cause illness when they enter the body, multiply, and spread to other parts. The rapid spread of COVID-19 to neighboring countries is examined in this research. Anticipating a positive COVID-19 occurrence helps in determining risks and creating countermeasures. As a result, developing robust mathematical models with small error margins for predictions is crucial. Based on these findings, a combined method of evaluating confirmed cases of COVID-19 with universal immunization is recommended. First, the best hyperparameter values of the RBF kernel-based LSSVM (least square support vector machine) were determined using the most recent Evolutionary Mating Algorithm (EMA). After that, LSSVM will complete the task of prediction. This hybrid method has been utilized for time series forecasting in Malaysia since the country's immunization program against COVID-19 got underway. We evaluate our results next to those of well-known methodologies in nature-inspired metaheuristics.
Hidden Markov Models have proved to be a very significant tool for various time-series related problems, especially where context is important. One such problem is Part-of-speech tagging. The work uses a customized HM...
Hidden Markov Models have proved to be a very significant tool for various time-series related problems, especially where context is important. One such problem is Part-of-speech tagging. The work uses a customized HMM to propose an effective and advanced solution to POS tagging. With a precision rate of 0.9657, recall of 0.9656, and F1-score of 0.9655, this proposed HMM-based model achieves an exceptional level of accuracy, exhibiting its accurate identification of the POS of words in a sentence. The statistical model employed by the HMM-based method predicts the most likely POS tags while taking into account the probabilities of transition between various POS tags. The model's dependability and resilience were demonstrated when it was tested on a different dataset after being trained on a extensive collection of text data. The study's findings demonstrate that the HMM-based strategy outperforms current POS tagging techniques, making it a significant contribution to the field of natural language processing. In addition, this research has significant implications for a number of NLP applications, including sentiment analysis, machine translation, and text categorization, paving the way for additional innovation and exploration in this domain.
This is the pre-acceptance version, to read the final version please go to IEEE TRANSACTION ON GEOSCIENCE AND REMOTE SENSING on IEEE Xplore. Infrared small target detection (IRSTD) has recently benefitted greatly from...
详细信息
The human brain's intricate functions are under-pinned by a vast network of synapses that enable chemical impulses between neurons. Neuroscientists employ two key approaches, functional and effective connectivity,...
The human brain's intricate functions are under-pinned by a vast network of synapses that enable chemical impulses between neurons. Neuroscientists employ two key approaches, functional and effective connectivity, to understand the brain's complexity, focusing on its operations, cognition, and behavior. While both methods utilize graph theory for network analysis, functional connectivity, which investigates associated brain activity, has seen more substantial research efforts than effective connectivity, which examines information processing's inter-regional impacts. In this research paper, we aim to present an extensive examination of the emerging discipline that combines graph theory with the analysis of brain characteristics, shedding light on how these characteristics arise from the interactions among different groups of neurons. Our primary focus lies in exploring the diverse cognitive and neurological applications that leverage functional Magnetic Resonance Imaging (fMRI) as a tool. Additionally, we offer a comprehensive overview of the methods employed to construct brain networks based on functional and efficient connections. Throughout the discussion, we emphasize the advantages and limitations associated with these approaches.
作者:
Wang, YunkeDu, BoXu, ChangSchool of Computer Science
National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan China School of Computer Science
Faculty of Engineering The University of Sydney Australia
Adversarial imitation learning has become a widely used imitation learning framework. The discriminator is often trained by taking expert demonstrations and policy trajectories as examples respectively from two catego...
详细信息
A great potential of various learning environment in mobile learning application can clearly be seen in current pandemic situation. The accessibility of the learning resources needs to be available from anywhere anyti...
详细信息
暂无评论